-
1
-
-
84949505015
-
ITS4: A Static Vulnerability Scanner for C and C++ Code
-
December
-
J. Viega, J.T. Bloch, T. Kohno, and G. McGraw, "ITS4: A Static Vulnerability Scanner for C and C++ Code", In ACSAC, December. 2000, pp. 257-267,
-
(2000)
In ACSAC
, pp. 257-267
-
-
Viega, J.1
Bloch, J.T.2
Kohno, T.3
McGraw, G.4
-
2
-
-
34247539967
-
Comparing Lexical Analysis Tools for Buffer Overflow Detection in Network Software
-
January
-
D. Pozza, R. Sisto, "Comparing Lexical Analysis Tools for Buffer Overflow Detection in Network Software", In COMSWARE, January. 2006, pp. 1-7.
-
(2006)
In COMSWARE
, pp. 1-7
-
-
Pozza, D.1
Sisto, R.2
-
3
-
-
85011293817
-
LCLint: A Tool for Using Specification to Check Code
-
December
-
D. Evans, J. Guttag, J. Homing, and Y.M. Tan, "LCLint: A Tool for Using Specification to Check Code", In SIGSOFT FSE, December. 1994, pp. 87-96.
-
(1994)
In SIGSOFT FSE
, pp. 87-96
-
-
Evans, D.1
Guttag, J.2
Homing, J.3
Tan, Y.M.4
-
4
-
-
33244470892
-
Improving Software Security with a C Pointer Analysis
-
May
-
D. Avots, M. Dalton, V.B. Livshits, and M.S. Lam, "Improving Software Security with a C Pointer Analysis", In ICSE, May. 2005, pp. 332-341.
-
(2005)
In ICSE
, pp. 332-341
-
-
Avots, D.1
Dalton, M.2
Livshits, V.B.3
Lam, M.S.4
-
5
-
-
56349146235
-
-
Feb
-
Newsome J., Song D., Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software, In NDSS, Feb. 2005.
-
(2005)
Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software, In NDSS
-
-
Newsome, J.1
Song, D.2
-
6
-
-
35348951470
-
The Software Model Checker Blast: Applications to Software Engineering
-
D. Beyer, T.A. Henzinger, R. Jhala, and R. Majumdar, "The Software Model Checker Blast: Applications to Software Engineering", In STTT, 2007, pp. 505-525.
-
(2007)
In STTT
, pp. 505-525
-
-
Beyer, D.1
Henzinger, T.A.2
Jhala, R.3
Majumdar, R.4
-
7
-
-
33646032658
-
CCured: Type-safe retrofitting of legacy software
-
May
-
G.C. Necula, J. Condit, M. Harren, S. McPeak, and W. Weimer, "CCured: type-safe retrofitting of legacy software", In TOPLAS, May. 2005, pp. 477-526.
-
(2005)
In TOPLAS
, pp. 477-526
-
-
Necula, G.C.1
Condit, J.2
Harren, M.3
McPeak, S.4
Weimer, W.5
-
8
-
-
85081874807
-
A first step towards automated detection of buffer overrun vulnerabilities
-
D. Wagner, J. Foster, E. Brewer, and A. Aiken. "A first step towards automated detection of buffer overrun vulnerabilities", In NDSS, 2000, pp. 3-17.
-
(2000)
In NDSS
, pp. 3-17
-
-
Wagner, D.1
Foster, J.2
Brewer, E.3
Aiken, A.4
-
9
-
-
0029180092
-
Formal language, grammar and set-constraint-based program analysis by abstract interpretation
-
Oct
-
P. Cousot, P. Cousot, "Formal language, grammar and set-constraint-based program analysis by abstract interpretation", In FPCA, Oct. 1995, pp. 170-181.
-
(1995)
In FPCA
, pp. 170-181
-
-
Cousot, P.1
Cousot, P.2
-
10
-
-
33749833959
-
Cascade: C assertion checker and deductive engine
-
N. Sethi, C. Barret, "Cascade: C assertion checker and deductive engine", In CAV, 2006, pp. 166-169.
-
(2006)
In CAV
, pp. 166-169
-
-
Sethi, N.1
Barret, C.2
-
11
-
-
33646148021
-
A brief survey of program slicing
-
Mar
-
B.W Xu, J. Qian, X.F. Zhang, Z. Qiang Wu, and L. Chen. "A brief survey of program slicing", In ACM SIGSOFT Software Engineering Notes. 30(2), Mar. 2005, pp. 1-30.
-
(2005)
ACM SIGSOFT Software Engineering Notes
, vol.30
, Issue.2
, pp. 1-30
-
-
Xu, B.W.1
Qian, J.2
Zhang, X.F.3
Qiang Wu, Z.4
Chen, L.5
-
12
-
-
0020157396
-
Programmers use slices when debugging
-
M. Weiser, "Programmers use slices when debugging", In Commun. ACM, 1982, pp. 446-452.
-
(1982)
In Commun. ACM
, pp. 446-452
-
-
Weiser, M.1
-
14
-
-
14344256751
-
Using the unravel program slicing tool to evaluate high integrity software
-
May
-
J.R. Lyle, D.R. Wallace, "Using the unravel program slicing tool to evaluate high integrity software", In Proceedings of Software Quality Week, May. 1997.
-
(1997)
Proceedings of Software Quality Week
-
-
Lyle, J.R.1
Wallace, D.R.2
-
16
-
-
0020299274
-
Specification and verification of concurrent systems in CESAR
-
Proc. Symposium on Programming, Springer
-
Queille, J.P., Sifakis, J.: Specification and verification of concurrent systems in CESAR. In: Proc. Symposium on Programming, LNCS 137. Springer, 1982, pp. 337-351.
-
(1982)
LNCS
, vol.137
, pp. 337-351
-
-
Queille, J.P.1
Sifakis, J.2
-
17
-
-
84937567800
-
Temporal-safety poofs for systems code
-
Proc. CAV, Springer
-
Henzinger, T.A., Jhala, R., Majumdar, R., Necula, G.C., Sutre, G., and Weimer, W., Temporal-safety poofs for systems code. In: Proc. CAV, LNCS 2404, Springer, 2002, pp. 526-538.
-
(2002)
LNCS
, vol.2404
, pp. 526-538
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Necula, G.C.4
Sutre, G.5
Weimer, W.6
-
18
-
-
4243189286
-
Counterexample-guided abstraction refinement for symbolic model checking
-
Sep
-
E. Clarke, O. Grumberg, S. Jha, Y. Lu, and H. Veith, " Counterexample-guided abstraction refinement for symbolic model checking", In J. ACM, Sep. 2003, pp. 752-794.
-
(2003)
In J. ACM
, pp. 752-794
-
-
Clarke, E.1
Grumberg, O.2
Jha, S.3
Lu, Y.4
Veith, H.5
-
19
-
-
0036041563
-
Lazy abstraction
-
T.A. Henzinger, R. Jhala, R. Majumdar, and G. Sutre. "Lazy abstraction", In POPL, 2002, pp. 58-70.
-
(2002)
In POPL
, pp. 58-70
-
-
Henzinger, T.A.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
20
-
-
3142766211
-
ATOM: A System for Building Customized Program Analysis Tools
-
June
-
A. Srivastava, A. Eustace, "ATOM: A System for Building Customized Program Analysis Tools", In PLDI, June. 1994, pp. 528-539.
-
(1994)
In PLDI
, pp. 528-539
-
-
Srivastava, A.1
Eustace, A.2
-
21
-
-
31944440969
-
-
C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. Reddi, and K. Hazelwood. Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation, In PLDT, June. 2005, pp. 190-200.
-
C. Luk, R. Cohn, R. Muth, H. Patil, A. Klauser, G. Lowney, S. Wallace, V. Reddi, and K. Hazelwood. "Pin: Building Customized Program Analysis Tools with Dynamic Instrumentation", In PLDT, June. 2005, pp. 190-200.
-
-
-
-
23
-
-
56349117830
-
A Buffer Overflow Benchmark for Software Model. Checkers
-
K. Ku, T.E. Hart, and M. Chechik, "A Buffer Overflow Benchmark for Software Model. Checkers", In ASE, 2007, pp. 389-392.
-
(2007)
In ASE
, pp. 389-392
-
-
Ku, K.1
Hart, T.E.2
Chechik, M.3
-
24
-
-
4544284873
-
Generating Tests from Counterexamples
-
D. Beyer, A.J. Chlipala, T.A. Henzinger, R. Jhala, and R. Majumdar, "Generating Tests from Counterexamples". In ICSE, 2004, pp. 326-335.
-
(2004)
In ICSE
, pp. 326-335
-
-
Beyer, D.1
Chlipala, A.J.2
Henzinger, T.A.3
Jhala, R.4
Majumdar, R.5
-
25
-
-
77954504457
-
A Practical Dynamic Buffer Overflow Detector
-
O. Ruwase, M. Lam, "A Practical Dynamic Buffer Overflow Detector", In NDSS, 2004, pp. 159-169.
-
(2004)
In NDSS
, pp. 159-169
-
-
Ruwase, O.1
Lam, M.2
-
27
-
-
35348992492
-
Configurable Software Verification: Concretizing the Convergence of Model Checking and Program Analysis
-
D. Beyer, T. A. Henzinger, and G. Théoduloz, "Configurable Software Verification: Concretizing the Convergence of Model Checking and Program Analysis", In CAV, 2007, pp. 504-518.
-
(2007)
In CAV
, pp. 504-518
-
-
Beyer, D.1
Henzinger, T.A.2
Théoduloz, G.3
|